US20130041906A1 - System and method for profiling clients within a system for harvesting community knowledge - Google Patents

System and method for profiling clients within a system for harvesting community knowledge Download PDF

Info

Publication number
US20130041906A1
US20130041906A1 US13/568,391 US201213568391A US2013041906A1 US 20130041906 A1 US20130041906 A1 US 20130041906A1 US 201213568391 A US201213568391 A US 201213568391A US 2013041906 A1 US2013041906 A1 US 2013041906A1
Authority
US
United States
Prior art keywords
data
user
profile
keywords
targets
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US13/568,391
Other versions
US9053458B2 (en
Inventor
Eytan Adar
Rajan Mathew Lukose
Joshua Rogers Tyler
Caesar Sengupta
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Valtrus Innovations Ltd
Hewlett Packard Enterprise Development LP
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US13/568,391 priority Critical patent/US9053458B2/en
Publication of US20130041906A1 publication Critical patent/US20130041906A1/en
Application granted granted Critical
Publication of US9053458B2 publication Critical patent/US9053458B2/en
Assigned to HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP reassignment HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Assigned to OT PATENT ESCROW, LLC reassignment OT PATENT ESCROW, LLC PATENT ASSIGNMENT, SECURITY INTEREST, AND LIEN AGREEMENT Assignors: HEWLETT PACKARD ENTERPRISE COMPANY, HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Adjusted expiration legal-status Critical
Assigned to VALTRUS INNOVATIONS LIMITED reassignment VALTRUS INNOVATIONS LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: OT PATENT ESCROW, LLC
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09BEDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
    • G09B7/00Electrically-operated teaching apparatus or devices working with questions and answers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/535Tracking the activity of the user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]

Definitions

  • the present invention relates generally to systems and methods for information sharing and knowledge management, and more particularly for profiling clients within a system for harvesting community knowledge.
  • K-bases Knowledge Databases
  • Knowledge Management systems which rely on users to explicitly describe their personal information, knowledge, and expertise to a centralized K-base.
  • FIG. 1 is a dataflow diagram of a conventional knowledge management system 100 .
  • information providing users 102 explicitly decide what descriptive information they provide to a central database 104 .
  • An information seeking user 106 then performs a query on the central database 104 in order to find an information provider who perhaps may be able to answer the seeker's question.
  • Tacit knowledge is knowledge a user possesses, but which the user either does not consider important enough to enter, or which they may not even be consciously aware that they know.
  • a second significant problem with knowledge management systems is the information provider's lack of privacy with respect to their personal information stored on the central database 104 .
  • information providers may be unwilling to reveal much about themselves in the presence of a risk that their privacy would be violated.
  • the provider must pre-screen all information to be revealed, in order to make sure that the information provided does not contain information which the user would not be comfortable with others having access to.
  • the resulting high participation costs often results in profiles that are stale and lack richness.
  • Free-riding occurs when there are information seekers who are not also information providers. They benefit from the information stored on databases, but do not contribute to them. Free-riding tends to make all users worse off, since a knowledge management system's and K-base's value depends upon the richness and fidelity of each users' contributions.
  • a fourth problem is cost.
  • Conventional centralized systems require the installation of additional hardware dedicated to the knowledge management system and do not make use of otherwise unutilized resources such as the user's own personal computer.
  • Collaborative filtering techniques also have similar problems.
  • Collaborative filtering is a tool for selectively presenting users with information recommendations based on the collective wisdom of the participant users.
  • these systems require users to actively mark incoming information as relevant or not relevant to their interests.
  • a central system manages this information and attempts to group individuals with similar interests (as expressed by the ratings they assign to pieces of information). Users who seek knowledge in are then directed to information that members like them have indicated as relevant. Due to their centralized nature, these systems lack many privacy features and require heavy active participation by individuals. For this reason collaborative filtering systems frequently do not have access to rich profiles. Additionally, the information that is filtered may not address specific information needs and the user must then wade through the information or perform additional searches and may still find no answer.
  • the present invention is a privacy-preserving system and method for profiling clients within a system for knowledge management.
  • One embodiment of the method of the present invention includes the steps of: accessing a predetermined set of data targets; collecting data target information from the data targets; generating a client profile from the data target information; storing the profile on a client computer; receiving a message; and scoring the message with respect to the profile.
  • a second embodiment of the method of the present invention replaces the receiving and scoring steps with the steps of: accessing a web page; and scoring the web page with respect to the profile.
  • a third embodiment of the method of the present invention replaces the receiving and scoring steps with the steps of: receiving an e-mail; and scoring the e-mail with respect to the profile.
  • a fourth embodiment of the method of the present invention replaces the receiving and scoring steps with the steps of: opening a file; and scoring the file with respect to the profile.
  • a fifth embodiment of the method of the present invention includes the steps of: accessing a predetermined set of data targets; collecting data target information from the data targets; generating a client profile from the data target information; storing the profile on a client computer; receiving a message including filtering criteria; and displaying the message on the computer if the filtering criteria is found within the profile.
  • a sixth embodiment of the method of the present invention includes the steps of: generating a message; transmitting the message from a sending client to a set of receiving clients; accessing a predetermined set of data targets; collecting data target information from the data targets; generating a receiving client profile from the data target information; scoring the message with respect to the profile; and displaying the message on a receiving client's computer.
  • a seventh embodiment of the method of the present invention includes the steps of: generating a message including filtering criteria; transmitting the message from a sending client to a set of receiving clients; accessing a predetermined set of data targets; collecting data target information from the data targets; generating a receiving client profile from the data target information; scoring the message with respect to the profile; and displaying the message on the receiving client's computer if the filtering criteria is found within the profile.
  • the system of the present invention includes all means for implementing the method.
  • FIG. 1 is a dataflow diagram of a conventional system for knowledge management
  • FIG. 2 is a dataflow diagram of one embodiment of a system for profiling clients within a system for harvesting community knowledge
  • FIG. 3 is a flowchart of one embodiment of a method for harvesting community knowledge
  • FIG. 4 is a flowchart of one embodiment of a method for profiling clients within the method for harvesting community knowledge
  • FIG. 5 is a pictorial diagram of one embodiment of a “View/Edit Declared Profile” window within the system.
  • FIG. 6 is a pictorial diagram of another embodiment of a “View/Edit Declared Profile” window within the system.
  • the present invention provides a mechanism for publicly, privately, or anonymously providing information to and harvesting information from a community of users and information resources.
  • the present invention allows for the use of automatic profiling methods. These automatic methods eliminate a need for community members to laboriously maintain their own profiles in order to efficiently participate in the knowledge community.
  • users' profiles are a rich body of information, and users do not face high participation costs.
  • the invention also allows for anonymous questions and responses which further provides incentives for users to participate.
  • the present invention ameliorates the free-riding problem, and creates a low-cost, useful, user-friendly environment for knowledge sharing and expertise exchange.
  • FIG. 2 is a dataflow diagram of one embodiment of a system 200 for harvesting community knowledge.
  • FIG. 3 is a flowchart of one embodiment of a method 300 for harvesting community knowledge.
  • FIGS. 2 and 3 are herein discussed together.
  • the system 200 includes a client computer 202 under the control of a user 204 , and connected to a computer network 206 .
  • the client 202 both sends and receives messages respectively to and from other client computers and information sources via the network 206 .
  • client computer When a client computer generates and sends a message such client computer is herein alternately called a sending client, and when a client computer receives a message, such client computer is herein alternately called a receiving client.
  • client computer Preferably all client computers on the network include the same functionality, which is now described with respect to the client computer 202 , however some receiving clients may not currently have the present invention's software installed.
  • User profiling by the present invention enables the system 200 to capture historical information about the user 204 , as well as real-time information as the user 204 goes about their daily digital business. This knowledge is expressed indirectly in the user's 204 behavior and data stored on the client computer 202 and from the user 204 and client computer 202 interactions with the network 206 .
  • the present invention uses an observer module 208 to automatically compile and store user profile information in a client profile 210 .
  • the client profile 210 is generated using systematic, objective and repeatable methods which can be adjusted and modified to suit any number of user environments and/or information processing end goals. Since the client profile 210 is automatically created, the user 204 is relieved from the arduous task of having to manually build their own profile. This dramatically reduces participation costs for all users of the present invention, while ensuring that the user's profile is constantly kept up to date.
  • more than one data source or set of data items are profiled in order to generate a multi-dimensional understanding of the user's 204 knowledge and that the resultant user profile is of a high quality.
  • singular sources of data such as e-mail, tend not to fully reflect a user's interests and expertise.
  • user profiles are preferably generated on each user's own computer 202 , no new hardware resources need be purchased in order to implement the present invention.
  • the method 300 begins in step 302 with the observer module 208 generating and maintaining the client profile 210 on the client computer 202 .
  • Step 302 is now described in more detail in FIG. 4 .
  • FIG. 4 is a flowchart of one embodiment of a method 400 for profiling clients within the method 300 for harvesting community knowledge.
  • the profiling method 400 begins in step 402 wherein the observer module 208 accesses a predetermined set of data targets for building the client profile 210 .
  • the set of data targets are preferably selected to provide a robust source of data for processing into a meaningful and versatile client profile 210 .
  • the data targets include information stored on the client computer 202 , information accessible over the network 206 , as well as which can be obtained by monitoring the user's 204 activities on the computer 202 and over the network 206 .
  • the observer module 208 spawns an observer sub-process for each data target in the set.
  • some of the sub-process must, in step 406 , collect certain ephemeral information in real-time.
  • ephemeral information may include temporarily cached data which is deleted after the data target terminates operations, network traffic information, as well as information received by the data target, such as e-mails or messages, which the user 204 subsequently deletes before said information can be permanently saved.
  • information otherwise saved within a storage resource may be retrieved as needed, in step 408 .
  • the observer 208 analyzes the collected and retrieved information using data mining techniques.
  • structured data items within the collected and/or retrieved information such as e-mail addresses or URLs, are stored in dedicated fields within the client profile 210 .
  • Unstructured data items within the collected and retrieved information such as pure text, however are first statistically analyzed. The statistical analysis includes, first identifying a set of keywords and a set of key phrases within the unstructured data items, in step 414 , and then, calculating a frequency of occurrence for each keyword and key phrase within the data item, in step 416 .
  • the keywords, key phrases, and their respective calculated frequencies of occurrence are then stored in the client profile 210 .
  • the unstructured data itself is not stored within the client profile 210 .
  • the client profile 210 data structure is preferably that of a relational database upon which queries can be easily performed.
  • the present invention's observer 208 by collecting, retrieving, and analyzing, information from the data targets, effectively captures the user's 204 tacit knowledge, which the user 204 themselves may not even be conscious of having knowledge, expertise, or an interest in.
  • the client profile 210 may at the user's 204 discretion be supplemented with additional information provided explicitly by the user 204 .
  • FIG. 5 is a pictorial diagram 500 of one embodiment of a “View/Edit Declared Profile” window 502 within the system 200 for allowing the user 204 to supplement the client profile 210 .
  • the window 502 includes a self-description field 504 for the user 204 to explicitly describe themselves, and input their knowledge, expertise, and interests as a series of comma separated information strings.
  • the user 204 may also add any other information which the user 204 deems relevant to other users on the network 206 .
  • a submit description button 506 adds the self-description field 504 to the client profile 210 .
  • FIG. 6 is a pictorial diagram 600 of another embodiment of a “View/Edit Declared Profile” window 602 within the system 200 .
  • the window 602 also includes a self-description field 602 and a submit description button 606 which function in a similar manner to the embodiment 502 described above, however, the window 602 also includes a “The last 10 emails you sent” field 608 and a “Last 10 urls you have visited” field 610 . “The last 10 emails you sent” field 608 and the “Last 10 urls you have visited” field 610 are two of the structured data items collected and stored by the observer module 208 according to step 412 of the profile generation method 400 . They are provided here for the user's 204 benefit. The user 204 may select and delete individual entries if desired through a search/delete interface.
  • the client profile 210 is preferably stored only on the client computer 202 , however the profile 210 may also be stored remotely either in encrypted or password protected form and viewable only by the user 204 . Also to toward this goal, the user 204 is also preferably given an option of erasing their client profile 210 , or having the observer 208 rebuild a new client profile for the user 204 .
  • a high degree of user privacy encourages users to permit the system 200 to build very rich user profiles which go far beyond those users would otherwise voluntarily disclose to a central database.
  • the following data targets are preferably included within the predetermined set of data targets mentioned in step 402 . Specific preferred processing techniques for each of these data targets are also discussed. Those skilled in the art however will recognize that many additional data targets and processing techniques may also be employed and that a particular mix of data targets and processing techniques which yield a best client profile may vary with the set of users and network configuration to which the present invention is applied.
  • Message data targets include messages routed over the peer-to-peer 226 and central server 224 networks, as well as e-mail messages routed over the e-mail network 222 .
  • E-mail is one of the most fundamental and prevalent forms of communication today and as such is considered to be a good source of user profile information.
  • E-mail sub-processes within the observer module 208 access the e-mail messages 221 transmitted and received by the e-mail client 230 over the e-mail network 222 .
  • Structured data items from the e-mail which are preferably stored in the client profile 210 include: the email addresses, domains, and identities for the sender and all of the recipient's; and message timestamps.
  • Unstructured e-mail data consisting mainly of the body of an e-mail message, are processed according to the statistical techniques discussed above, into keywords, key phrases, and frequencies of occurrence before being stored in the client profile 210 .
  • Behavioral data preferably stored include: which e-mails or messages the user 204 reads, stores, deletes, and/or ignores. Those e-mails or messages which the user 204 reads or stores becomes part of the user's 204 “positive-profile.” Whereas those e-mails and messages which the user 204 either deletes or ignores becomes part of the user's 204 “negative-profile.”
  • Messages processed by either the peer-to-peer 226 or central server 224 networks are similarly processed and added to the client profile 210 .
  • Information browsing data targets monitored by sub-processes within the observer module 208 include: data a files transmitted to or downloaded from the peer-to-peer 226 and central server 224 networks, client files 214 viewed, modified, or deleted by the user, such as word processing, spreadsheet and other files; as well as web page information routed over the web 218 by the internet client 232 into the web page cache 217 .
  • Structured data items which are preferably stored in the client profile 210 include: URLs stored in the user's 204 bookmark and/or favorites file; web pages visited by the user or stored in the web page cache 217 ; identifying information from client files 214 accessed by the user 204 ; and time and frequency of visitation to said web pages or client files 214 .
  • Unstructured data consisting mainly of the body of the web pages visited and client files 214 accessed by the user, is also processed according to the statistical techniques discussed above, into keywords, key phrases, and frequencies of occurrence before being stored in the client profile 210 .
  • Behavioral data preferably stored include: web surfing patterns and browsing behavior.
  • Installed hardware and software data targets monitored by sub-processes within the observer module 208 include the client hardware 211 and software 212 installed on the computer 202 .
  • the client software 212 includes the e-mail client 230 and the internet client 232 .
  • Structured data items which are preferably stored in the client profile 210 include: hardware 211 device information; software 212 installation and operational information, available in part from registry files within the computer 202 ; and dates of installation for each hardware device and software process.
  • Behavioral data preferably stored include: user interactions with the installed hardware 211 and software 212 , such as frequency of use or reconfiguration.
  • Other information sources which the observer 208 may access in order to build the client profile 210 include: user information stored in remote enterprise directories and on the central server 224 .
  • user information stored within a LDAP enterprise directory can be accessed by the observer module 208 over the network 206 .
  • the user information stored on the LDAP server may include the user's department number, location, and other human resources information.
  • Messages are herein defined to include a wide variety of communications known to those skilled in the art, including any communication seeking, sending, and/or culling information from an information market.
  • messages can include questions, announcements, and/or information processing routines.
  • the user 204 accesses a user interface module 228 .
  • the user interface module 228 preferably includes a set of software modules for interfacing with the user 204 .
  • Such modules at a minimum include the e-mail client 230 , which stores a predetermined set of e-mail messages 221 , and the Internet client 232 , which stores information in the web page cache 217 .
  • These two modules 230 and 232 provide the user 204 with alternate ways of using the present invention and preferably, both contain similar functionality, such as text windows and folders for storing messages both sent and received.
  • the user 204 initiates the message generating process, such as by clicking on an “Ask a Question” button in a toolbar within the user interface.
  • the user interface module 228 displays a number of pre-defined message types to the user 204 .
  • a message After a message has been generated it is preferably assigned a globally unique identifier and stored in a messages database 236 .
  • a private-public key pair is preferably generated for each new message. The public key is then sent with the message so that a receiving client can encrypt their response, ensuring that only the user 204 , having the corresponding private key, can decrypt and view such response. This provides a further level of security and privacy within the present invention.
  • the network module 216 periodically scans the message database 236 for new messages generated by the user 204 . Then in step 306 , a network protocol module 219 formats the new message according to an XML (Extensible Markup Language) protocol for transmission by the network module 216 over the network 206 . Both a client computer sending the message and a client computer receiving the message must be apprised of the particular XML protocol used to format the message, in order for communication to occur.
  • XML Extensible Markup Language
  • the peer-to-peer network 226 is limited to an enterprise's intranet so that only a predetermined set of client computers on the network 206 may have an opportunity to respond to the message.
  • a baseline level of confidentiality, expertise, and/or message response integrity may be maintained.
  • the scope of users may be limited to only those who are employed within a particular enterprise, who belong to a particular professional society, or who are students and one or more universities. The exact scope of users will thus depend upon a particular application of the present invention.
  • messages may be transmitted over global e-mail and/or web networks, but in an encrypted format which again limits the scope of users. In other embodiments, there may be no limits on the scope of users who may be given an opportunity to respond to the messages.
  • the network module 216 transmits the message over a predetermined portion of the computer network 206 .
  • the computer client 202 transmits a message over the network 206 it is called a sending client
  • the computer client 202 receives a message over the network 206 it is called a receiving client.
  • all client computers function as both sending and receiving clients.
  • each receiving client having the present invention installed stores a copy of the XML encoded message in their respective messages database.
  • client computer 202 functionality within the client computer 202 for processing received messages is discussed as if the client computer 202 was one of the receiving client computers. Such a context switch is appropriate because preferably each client computer contains a complete and self contained version of the present invention's software.
  • step 310 the system module 234 within the client computer 202 retrieves, and commands a filtering/scoring module 238 to filter and score, newly received messages which have been stored in the messages database 236 .
  • the filtering/scoring module 238 compares the message with information stored in the user's 204 client profile 210 . If necessary however, the message may be compared with data stored elsewhere in the client computer 202 , such as in the e-mail client 230 , the e-mail messages 221 , the internet client 232 , the web page cache 217 , the client software 212 , the client files 214 , and the client messages 236 .
  • a received message is filtered by the filtering/scoring module 238 when such message contains a predetermined set of criteria, inserted by the message sending client, in order to target selected receiving clients.
  • filtering criteria is preferably very flexible and is left at the discretion of the sending client user.
  • the filtering criteria may look for a particular data string, or at some other information within a receiving client's client profile 210 .
  • a client profile 210 which does not meet the filtering criteria merely results in a low message score.
  • a message which does not meet the filtering criteria does not automatically prevent the user 204 from seeing the message.
  • an overall weighted average score may be generated which depends upon not only all of the filtering criteria, but also the message's score. How the message's score is generated is discussed next.
  • the filtering/scoring module 238 preferably scores messages using statistical information retrieval techniques, including linguistic analysis.
  • Information retrieval techniques are commonly known to be used for accessing and analyzing large blocks of data and then extracting all or selected portions of such data according to a wide variety of methods. Messages which include structured or unstructured data items, which are within the user's 204 positive-profile, tend to increase the message's score. While messages which include structured and unstructured data items, which are within the user's 204 negative-profile, tend to decrease the message's score.
  • receiving clients who have the present invention's software already installed and have received an e-mail message containing an embedded XML message have a copy of the embedded message placed in their messages database 236 so that the message can be filtered and scored.
  • Receiving clients who do not have the present invention's software installed however, only see the e-mail message in their standard e-mail inbox, and no other processing is performed.
  • Such intelligently targeted messaging also builds user confidence in and reliance on the present invention. This is because unlike in conventional systems where users often have to wade though in-boxes full of junk or marginally useful e-mail, users using the present invention generally know and rely on the fact that their time will not be wasted on such unimportant messages. Instead users of the present invention will be even more likely to timely respond to messages received because the messages will be so on-point to their expertise and/or interests.
  • the present invention automatically performs the necessary sifting so that if a user receives a message using the present invention, such message will be useful to them.
  • the received message is displayed to the receiving client if the message has not been filtered out and/or if the message score exceeds a predetermined threshold.
  • Messages are preferably displayed to the receiving client according to their respective score.
  • the score represents a likelihood that the receiving client will find the message relevant to or within their expertise.
  • the receiving client then may select and respond to one of the messages.
  • a response from the receiving client is sent over the network 206 back to the sending client anonymously or in an encrypted format. After step 314 the preferred method ends.
  • While the present invention has been discussed with respect to the generation, transmission and response to messages, the present inventions' user profiling and scoring functionality is equally applicable toward processing other types of information as well.
  • Other information includes data displayed within a current web page being viewed by the user 204 .
  • a relevance vector could be generated from said web page data and compared to the user's 204 expertise vector generated from the client profile 210 .
  • User's would be notified of a particular relevance of the currently viewed web page if the relevance and expertise vectors when compared yield a score which exceeds a predetermined threshold. In this way user's browsing the web could be apprised of particular web pages which may closely align with their interests and/or expertise.
  • Other information similarly processed and scored may include: normal e-mail messages which have not been generated using the present inventions' functionality; files downloaded from the central server 224 or received from some other source; or expertise information stored on a central enterprise database. Those skilled in the art will know of other information sources to which the present invention may also be successfully applied.

Abstract

A privacy-preserving system and method is disclosed for profiling clients within a system for knowledge management. The method of the present invention discloses steps for generating a client profile in support of receiving and processing messages using scoring techniques and/or filtering techniques. The method of the present invention further includes steps for generating a client profile in support of a method for generating and obtaining responses to messages using scoring techniques and/or filtering techniques. The system of the present invention, includes all means for implementing the method.

Description

    CROSS-REFERENCE TO CO-PENDING APPLICATION
  • This application is a continuation of U.S. patent application Ser. No. 10/106,096, filed Mar. 25, 2002, which is hereby incorporated by reference.
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention relates generally to systems and methods for information sharing and knowledge management, and more particularly for profiling clients within a system for harvesting community knowledge.
  • 2. Discussion of Background Art
  • Satisfying information needs in a diverse, heterogeneous information environment is challenging. In order to even begin the process of finding information resources or answers to questions, individuals typically must know either where to look, or whom to ask. This is often a daunting task, especially in large enterprises where many of the members will not know each other, nor be aware of all the information resources potentially at their disposal.
  • Current systems for storing information and/or organizational expertise include Knowledge Databases (K-bases), such as document repositories and corporate directories, and Knowledge Management systems, which rely on users to explicitly describe their personal information, knowledge, and expertise to a centralized K-base.
  • FIG. 1 is a dataflow diagram of a conventional knowledge management system 100. In a typical architecture, information providing users 102 explicitly decide what descriptive information they provide to a central database 104. An information seeking user 106 then performs a query on the central database 104 in order to find an information provider who perhaps may be able to answer the seeker's question.
  • There are several significant problems with such systems. Knowledge management systems, like that shown in FIG. 1, require that information providers spend a significant amount of time and effort entering and updating their personal information on the central database 104. For this reasons alone, such systems tend to have very low participation rates. In addition, even those information providers, who take time to enter and update this information, may misrepresent their personal information or level of knowledge and expertise be it willfully or not. Furthermore, they may neglect or be unable to reveal much of their tacit knowledge within their personal description. Tacit knowledge is knowledge a user possesses, but which the user either does not consider important enough to enter, or which they may not even be consciously aware that they know.
  • Because of the inaccuracy and/or incompleteness of such personal information, information seekers, even after all of their searching efforts, may still find their questions left unanswered, perhaps because the “expert” they identified may not have the bandwidth to respond. Similarly, even information seekers who discover the existence of a relevant K-base may be required to formulate queries which are so complex that they either can not or will not bother to perform a proper search
  • A second significant problem with knowledge management systems is the information provider's lack of privacy with respect to their personal information stored on the central database 104. No matter what agreements a knowledge management system's central database 104 provider has made with the user, the fact remains that the central database 104 provider still has the user's personal information, which means that that personal information is out of the direct control of said user. As a result, information providers may be unwilling to reveal much about themselves in the presence of a risk that their privacy would be violated. In such systems, the provider must pre-screen all information to be revealed, in order to make sure that the information provided does not contain information which the user would not be comfortable with others having access to. The resulting high participation costs often results in profiles that are stale and lack richness.
  • Another problem with such systems, is their lack of anonymity. Information seekers and providers cannot remain anonymous while performing queries or asking questions. As such, they may not perform a search, as a question, or wholeheartedly reveal their knowledge about a particular topic in their response to another user's question.
  • All of the above problems lead to free-riding by many of those using such conventional knowledge management systems. Free-riding occurs when there are information seekers who are not also information providers. They benefit from the information stored on databases, but do not contribute to them. Free-riding tends to make all users worse off, since a knowledge management system's and K-base's value depends upon the richness and fidelity of each users' contributions.
  • A fourth problem is cost. Conventional centralized systems require the installation of additional hardware dedicated to the knowledge management system and do not make use of otherwise unutilized resources such as the user's own personal computer.
  • Collaborative filtering techniques also have similar problems. Collaborative filtering is a tool for selectively presenting users with information recommendations based on the collective wisdom of the participant users. Generally these systems require users to actively mark incoming information as relevant or not relevant to their interests. A central system manages this information and attempts to group individuals with similar interests (as expressed by the ratings they assign to pieces of information). Users who seek knowledge in are then directed to information that members like them have indicated as relevant. Due to their centralized nature, these systems lack many privacy features and require heavy active participation by individuals. For this reason collaborative filtering systems frequently do not have access to rich profiles. Additionally, the information that is filtered may not address specific information needs and the user must then wade through the information or perform additional searches and may still find no answer.
  • In response to the concerns discussed above, what is needed is a system and method for profiling clients within a system for harvesting community knowledge that overcomes the problems of the prior art.
  • SUMMARY OF THE INVENTION
  • The present invention is a privacy-preserving system and method for profiling clients within a system for knowledge management. One embodiment of the method of the present invention includes the steps of: accessing a predetermined set of data targets; collecting data target information from the data targets; generating a client profile from the data target information; storing the profile on a client computer; receiving a message; and scoring the message with respect to the profile.
  • A second embodiment of the method of the present invention replaces the receiving and scoring steps with the steps of: accessing a web page; and scoring the web page with respect to the profile.
  • A third embodiment of the method of the present invention replaces the receiving and scoring steps with the steps of: receiving an e-mail; and scoring the e-mail with respect to the profile.
  • A fourth embodiment of the method of the present invention replaces the receiving and scoring steps with the steps of: opening a file; and scoring the file with respect to the profile.
  • A fifth embodiment of the method of the present invention includes the steps of: accessing a predetermined set of data targets; collecting data target information from the data targets; generating a client profile from the data target information; storing the profile on a client computer; receiving a message including filtering criteria; and displaying the message on the computer if the filtering criteria is found within the profile.
  • A sixth embodiment of the method of the present invention includes the steps of: generating a message; transmitting the message from a sending client to a set of receiving clients; accessing a predetermined set of data targets; collecting data target information from the data targets; generating a receiving client profile from the data target information; scoring the message with respect to the profile; and displaying the message on a receiving client's computer.
  • A seventh embodiment of the method of the present invention includes the steps of: generating a message including filtering criteria; transmitting the message from a sending client to a set of receiving clients; accessing a predetermined set of data targets; collecting data target information from the data targets; generating a receiving client profile from the data target information; scoring the message with respect to the profile; and displaying the message on the receiving client's computer if the filtering criteria is found within the profile.
  • The system of the present invention, includes all means for implementing the method.
  • These and other aspects of the invention will be recognized by those skilled in the art upon review of the detailed description, drawings, and claims set forth below.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a dataflow diagram of a conventional system for knowledge management;
  • FIG. 2 is a dataflow diagram of one embodiment of a system for profiling clients within a system for harvesting community knowledge;
  • FIG. 3 is a flowchart of one embodiment of a method for harvesting community knowledge;
  • FIG. 4 is a flowchart of one embodiment of a method for profiling clients within the method for harvesting community knowledge;
  • FIG. 5 is a pictorial diagram of one embodiment of a “View/Edit Declared Profile” window within the system; and
  • FIG. 6 is a pictorial diagram of another embodiment of a “View/Edit Declared Profile” window within the system.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
  • The present invention provides a mechanism for publicly, privately, or anonymously providing information to and harvesting information from a community of users and information resources. By preserving the privacy of users and their profiles, the present invention allows for the use of automatic profiling methods. These automatic methods eliminate a need for community members to laboriously maintain their own profiles in order to efficiently participate in the knowledge community. As a result, users' profiles are a rich body of information, and users do not face high participation costs. The invention also allows for anonymous questions and responses which further provides incentives for users to participate. As a result, the present invention ameliorates the free-riding problem, and creates a low-cost, useful, user-friendly environment for knowledge sharing and expertise exchange.
  • FIG. 2 is a dataflow diagram of one embodiment of a system 200 for harvesting community knowledge. FIG. 3 is a flowchart of one embodiment of a method 300 for harvesting community knowledge. FIGS. 2 and 3 are herein discussed together. The system 200 includes a client computer 202 under the control of a user 204, and connected to a computer network 206. The client 202 both sends and receives messages respectively to and from other client computers and information sources via the network 206.
  • When a client computer generates and sends a message such client computer is herein alternately called a sending client, and when a client computer receives a message, such client computer is herein alternately called a receiving client. Preferably all client computers on the network include the same functionality, which is now described with respect to the client computer 202, however some receiving clients may not currently have the present invention's software installed.
  • User Profiling
  • User profiling by the present invention, enables the system 200 to capture historical information about the user 204, as well as real-time information as the user 204 goes about their daily digital business. This knowledge is expressed indirectly in the user's 204 behavior and data stored on the client computer 202 and from the user 204 and client computer 202 interactions with the network 206.
  • The present invention uses an observer module 208 to automatically compile and store user profile information in a client profile 210. The client profile 210 is generated using systematic, objective and repeatable methods which can be adjusted and modified to suit any number of user environments and/or information processing end goals. Since the client profile 210 is automatically created, the user 204 is relieved from the arduous task of having to manually build their own profile. This dramatically reduces participation costs for all users of the present invention, while ensuring that the user's profile is constantly kept up to date.
  • Preferably, more than one data source or set of data items are profiled in order to generate a multi-dimensional understanding of the user's 204 knowledge and that the resultant user profile is of a high quality. This is because singular sources of data, such as e-mail, tend not to fully reflect a user's interests and expertise. Also, since user profiles are preferably generated on each user's own computer 202, no new hardware resources need be purchased in order to implement the present invention.
  • The method 300 begins in step 302 with the observer module 208 generating and maintaining the client profile 210 on the client computer 202. Step 302 is now described in more detail in FIG. 4.
  • FIG. 4 is a flowchart of one embodiment of a method 400 for profiling clients within the method 300 for harvesting community knowledge. The profiling method 400 begins in step 402 wherein the observer module 208 accesses a predetermined set of data targets for building the client profile 210. The set of data targets are preferably selected to provide a robust source of data for processing into a meaningful and versatile client profile 210. The data targets include information stored on the client computer 202, information accessible over the network 206, as well as which can be obtained by monitoring the user's 204 activities on the computer 202 and over the network 206.
  • Next in step 404, the observer module 208 spawns an observer sub-process for each data target in the set. Depending upon the data target, some of the sub-process must, in step 406, collect certain ephemeral information in real-time. Such ephemeral information may include temporarily cached data which is deleted after the data target terminates operations, network traffic information, as well as information received by the data target, such as e-mails or messages, which the user 204 subsequently deletes before said information can be permanently saved. However, information otherwise saved within a storage resource may be retrieved as needed, in step 408.
  • In step 410, the observer 208 analyzes the collected and retrieved information using data mining techniques. In step 412, structured data items within the collected and/or retrieved information, such as e-mail addresses or URLs, are stored in dedicated fields within the client profile 210. Unstructured data items within the collected and retrieved information, such as pure text, however are first statistically analyzed. The statistical analysis includes, first identifying a set of keywords and a set of key phrases within the unstructured data items, in step 414, and then, calculating a frequency of occurrence for each keyword and key phrase within the data item, in step 416. In step 418, the keywords, key phrases, and their respective calculated frequencies of occurrence are then stored in the client profile 210. If the keyword or key phrase already exists within the client profile 210, their frequencies of occurrence are combined. Preferably, the unstructured data itself is not stored within the client profile 210. The client profile 210 data structure is preferably that of a relational database upon which queries can be easily performed.
  • Thus the present invention's observer 208, by collecting, retrieving, and analyzing, information from the data targets, effectively captures the user's 204 tacit knowledge, which the user 204 themselves may not even be conscious of having knowledge, expertise, or an interest in.
  • In step 420, the client profile 210 may at the user's 204 discretion be supplemented with additional information provided explicitly by the user 204.
  • FIG. 5 is a pictorial diagram 500 of one embodiment of a “View/Edit Declared Profile” window 502 within the system 200 for allowing the user 204 to supplement the client profile 210. The window 502 includes a self-description field 504 for the user 204 to explicitly describe themselves, and input their knowledge, expertise, and interests as a series of comma separated information strings. The user 204 may also add any other information which the user 204 deems relevant to other users on the network 206. A submit description button 506 adds the self-description field 504 to the client profile 210.
  • FIG. 6 is a pictorial diagram 600 of another embodiment of a “View/Edit Declared Profile” window 602 within the system 200. The window 602 also includes a self-description field 602 and a submit description button 606 which function in a similar manner to the embodiment 502 described above, however, the window 602 also includes a “The last 10 emails you sent” field 608 and a “Last 10 urls you have visited” field 610. “The last 10 emails you sent” field 608 and the “Last 10 urls you have visited” field 610 are two of the structured data items collected and stored by the observer module 208 according to step 412 of the profile generation method 400. They are provided here for the user's 204 benefit. The user 204 may select and delete individual entries if desired through a search/delete interface.
  • In order to maximize the user's 204 privacy and thereby encourage broad user participation within the information market, the client profile 210 is preferably stored only on the client computer 202, however the profile 210 may also be stored remotely either in encrypted or password protected form and viewable only by the user 204. Also to toward this goal, the user 204 is also preferably given an option of erasing their client profile 210, or having the observer 208 rebuild a new client profile for the user 204. A high degree of user privacy encourages users to permit the system 200 to build very rich user profiles which go far beyond those users would otherwise voluntarily disclose to a central database.
  • The following data targets are preferably included within the predetermined set of data targets mentioned in step 402. Specific preferred processing techniques for each of these data targets are also discussed. Those skilled in the art however will recognize that many additional data targets and processing techniques may also be employed and that a particular mix of data targets and processing techniques which yield a best client profile may vary with the set of users and network configuration to which the present invention is applied.
  • Message Data Targets:
  • Message data targets include messages routed over the peer-to-peer 226 and central server 224 networks, as well as e-mail messages routed over the e-mail network 222. E-mail is one of the most fundamental and prevalent forms of communication today and as such is considered to be a good source of user profile information. E-mail sub-processes within the observer module 208 access the e-mail messages 221 transmitted and received by the e-mail client 230 over the e-mail network 222.
  • Structured data items from the e-mail which are preferably stored in the client profile 210 include: the email addresses, domains, and identities for the sender and all of the recipient's; and message timestamps.
  • Unstructured e-mail data, consisting mainly of the body of an e-mail message, are processed according to the statistical techniques discussed above, into keywords, key phrases, and frequencies of occurrence before being stored in the client profile 210.
  • Behavioral data preferably stored include: which e-mails or messages the user 204 reads, stores, deletes, and/or ignores. Those e-mails or messages which the user 204 reads or stores becomes part of the user's 204 “positive-profile.” Whereas those e-mails and messages which the user 204 either deletes or ignores becomes part of the user's 204 “negative-profile.”
  • Messages processed by either the peer-to-peer 226 or central server 224 networks are similarly processed and added to the client profile 210.
  • Information Browsing Data Targets:
  • Information browsing data targets monitored by sub-processes within the observer module 208 include: data a files transmitted to or downloaded from the peer-to-peer 226 and central server 224 networks, client files 214 viewed, modified, or deleted by the user, such as word processing, spreadsheet and other files; as well as web page information routed over the web 218 by the internet client 232 into the web page cache 217.
  • Structured data items which are preferably stored in the client profile 210 include: URLs stored in the user's 204 bookmark and/or favorites file; web pages visited by the user or stored in the web page cache 217; identifying information from client files 214 accessed by the user 204; and time and frequency of visitation to said web pages or client files 214.
  • Unstructured data, consisting mainly of the body of the web pages visited and client files 214 accessed by the user, is also processed according to the statistical techniques discussed above, into keywords, key phrases, and frequencies of occurrence before being stored in the client profile 210.
  • Behavioral data preferably stored include: web surfing patterns and browsing behavior.
  • Installed Hardware and Software Data Targets:
  • Installed hardware and software data targets monitored by sub-processes within the observer module 208 include the client hardware 211 and software 212 installed on the computer 202. The client software 212 includes the e-mail client 230 and the internet client 232.
  • Structured data items which are preferably stored in the client profile 210 include: hardware 211 device information; software 212 installation and operational information, available in part from registry files within the computer 202; and dates of installation for each hardware device and software process.
  • Behavioral data preferably stored include: user interactions with the installed hardware 211 and software 212, such as frequency of use or reconfiguration.
  • Other Data Targets:
  • Other information sources which the observer 208 may access in order to build the client profile 210 include: user information stored in remote enterprise directories and on the central server 224. For example, user information stored within a LDAP enterprise directory can be accessed by the observer module 208 over the network 206. The user information stored on the LDAP server may include the user's department number, location, and other human resources information.
  • Message Generation
  • Next to be described is a system and method for generating messages in step 304 using the present invention. Messages are herein defined to include a wide variety of communications known to those skilled in the art, including any communication seeking, sending, and/or culling information from an information market. Thus messages can include questions, announcements, and/or information processing routines.
  • To begin, the user 204 accesses a user interface module 228. The user interface module 228 preferably includes a set of software modules for interfacing with the user 204. Such modules at a minimum include the e-mail client 230, which stores a predetermined set of e-mail messages 221, and the Internet client 232, which stores information in the web page cache 217. These two modules 230 and 232 provide the user 204 with alternate ways of using the present invention and preferably, both contain similar functionality, such as text windows and folders for storing messages both sent and received.
  • Through the user interface module 228, the user 204 initiates the message generating process, such as by clicking on an “Ask a Question” button in a toolbar within the user interface. In response, the user interface module 228 displays a number of pre-defined message types to the user 204.
  • After a message has been generated it is preferably assigned a globally unique identifier and stored in a messages database 236. A private-public key pair is preferably generated for each new message. The public key is then sent with the message so that a receiving client can encrypt their response, ensuring that only the user 204, having the corresponding private key, can decrypt and view such response. This provides a further level of security and privacy within the present invention.
  • The network module 216 periodically scans the message database 236 for new messages generated by the user 204. Then in step 306, a network protocol module 219 formats the new message according to an XML (Extensible Markup Language) protocol for transmission by the network module 216 over the network 206. Both a client computer sending the message and a client computer receiving the message must be apprised of the particular XML protocol used to format the message, in order for communication to occur.
  • Preferably the peer-to-peer network 226 is limited to an enterprise's intranet so that only a predetermined set of client computers on the network 206 may have an opportunity to respond to the message. By limiting the scope of users allowed to see messages, a baseline level of confidentiality, expertise, and/or message response integrity may be maintained. For instance, the scope of users may be limited to only those who are employed within a particular enterprise, who belong to a particular professional society, or who are students and one or more universities. The exact scope of users will thus depend upon a particular application of the present invention.
  • In alternate embodiments, messages may be transmitted over global e-mail and/or web networks, but in an encrypted format which again limits the scope of users. In other embodiments, there may be no limits on the scope of users who may be given an opportunity to respond to the messages.
  • Message Transmission
  • Next in step 308, the network module 216 transmits the message over a predetermined portion of the computer network 206. As mentioned above, when the computer client 202 transmits a message over the network 206 it is called a sending client, while when the computer client 202 receives a message over the network 206 it is called a receiving client. Thus in normal operation, all client computers function as both sending and receiving clients.
  • While messages transmitted over the peer-to-peer network 226 achieve a high level of anonymity, many messages will likely be transmitted over the e-mail network 222 or displayed on a web 218 site in order to advertise the present invention and thereby build-up the peer-to-peer network 226.
  • However, regardless of over which network portion the message is sent, each receiving client having the present invention installed stores a copy of the XML encoded message in their respective messages database.
  • Message Filtering and Scoring
  • For purpose of the discussion to follow, functionality within the client computer 202 for processing received messages is discussed as if the client computer 202 was one of the receiving client computers. Such a context switch is appropriate because preferably each client computer contains a complete and self contained version of the present invention's software.
  • Thus in step 310, the system module 234 within the client computer 202 retrieves, and commands a filtering/scoring module 238 to filter and score, newly received messages which have been stored in the messages database 236.
  • In order to perform filtering and scoring, the filtering/scoring module 238 compares the message with information stored in the user's 204 client profile 210. If necessary however, the message may be compared with data stored elsewhere in the client computer 202, such as in the e-mail client 230, the e-mail messages 221, the internet client 232, the web page cache 217, the client software 212, the client files 214, and the client messages 236.
  • A received message is filtered by the filtering/scoring module 238 when such message contains a predetermined set of criteria, inserted by the message sending client, in order to target selected receiving clients. Such filtering criteria is preferably very flexible and is left at the discretion of the sending client user. For example, the filtering criteria may look for a particular data string, or at some other information within a receiving client's client profile 210.
  • In an alternate embodiment however, a client profile 210 which does not meet the filtering criteria merely results in a low message score. In this way, a message which does not meet the filtering criteria does not automatically prevent the user 204 from seeing the message. In such embodiments an overall weighted average score may be generated which depends upon not only all of the filtering criteria, but also the message's score. How the message's score is generated is discussed next.
  • The filtering/scoring module 238 preferably scores messages using statistical information retrieval techniques, including linguistic analysis. Information retrieval techniques are commonly known to be used for accessing and analyzing large blocks of data and then extracting all or selected portions of such data according to a wide variety of methods. Messages which include structured or unstructured data items, which are within the user's 204 positive-profile, tend to increase the message's score. While messages which include structured and unstructured data items, which are within the user's 204 negative-profile, tend to decrease the message's score.
  • Other techniques for scoring the messages are also known to those skilled in the art.
  • While the above filtering and scoring discussion assumes the message was received over the peer-to-peer network 226, messages received over the e-mail network 222 as well as by other paths within the network 206 are similarly filtered and scored if the receiving client has the present invention's software installed.
  • For example, receiving clients who have the present invention's software already installed and have received an e-mail message containing an embedded XML message, have a copy of the embedded message placed in their messages database 236 so that the message can be filtered and scored. Receiving clients who do not have the present invention's software installed, however, only see the e-mail message in their standard e-mail inbox, and no other processing is performed.
  • Thus the filtering and scoring techniques of the present invention in combination with the rich client profiles stored on each receiving client's computer are together what enable messages to be brought to the attention of the right set of users.
  • Such intelligently targeted messaging, however, also builds user confidence in and reliance on the present invention. This is because unlike in conventional systems where users often have to wade though in-boxes full of junk or marginally useful e-mail, users using the present invention generally know and rely on the fact that their time will not be wasted on such unimportant messages. Instead users of the present invention will be even more likely to timely respond to messages received because the messages will be so on-point to their expertise and/or interests.
  • For example, in the past when a sending client needed to identify appropriate participants to participate in an experiment, or submit papers for a seminar, the user would clumsily post an advertisement on a web or other site, and/or send out a generalized e-mail to a very large distribution list. In such cases, targeted users often miss the importance of or are annoyed by such communications which are buried in a sea of information they already are trying to sift through. In contrast, the present invention automatically performs the necessary sifting so that if a user receives a message using the present invention, such message will be useful to them.
  • Message Display and Response
  • In step 312, the received message is displayed to the receiving client if the message has not been filtered out and/or if the message score exceeds a predetermined threshold. Messages are preferably displayed to the receiving client according to their respective score. As discussed above, the score represents a likelihood that the receiving client will find the message relevant to or within their expertise.
  • The receiving client then may select and respond to one of the messages. In step 314 a response from the receiving client is sent over the network 206 back to the sending client anonymously or in an encrypted format. After step 314 the preferred method ends.
  • Processing Information from other Sources Using the Present Invention
  • While the present invention has been discussed with respect to the generation, transmission and response to messages, the present inventions' user profiling and scoring functionality is equally applicable toward processing other types of information as well. Other information includes data displayed within a current web page being viewed by the user 204. A relevance vector could be generated from said web page data and compared to the user's 204 expertise vector generated from the client profile 210. User's would be notified of a particular relevance of the currently viewed web page if the relevance and expertise vectors when compared yield a score which exceeds a predetermined threshold. In this way user's browsing the web could be apprised of particular web pages which may closely align with their interests and/or expertise.
  • Other information similarly processed and scored may include: normal e-mail messages which have not been generated using the present inventions' functionality; files downloaded from the central server 224 or received from some other source; or expertise information stored on a central enterprise database. Those skilled in the art will know of other information sources to which the present invention may also be successfully applied.
  • While one or more embodiments of the present invention have been described, those skilled in the art will recognize that various modifications may be made. Variations upon and modifications to these embodiments are provided by the present invention, which is limited only by the following claims.

Claims (21)

1.-20. (canceled)
21. A method comprising:
accessing a set of data targets;
collecting data target information from the data targets, wherein the data target information includes user behavioral data with respect to the data targets, the user behavioral data indicating which data targets a user reads and stores and which data targets the user ignores and deletes;
generating a client profile from the data target information, the client profile including keywords and associated frequencies of occurrence of the respective keywords in the data targets;
storing the client profile on a client computer;
receiving a data target at the client computer; and
scoring, by the client computer, the received data target using the client profile that includes the keywords and the associated frequencies.
22. The method of claim 21, wherein the data targets include messages, wherein the data target information includes the user behavioral data indicating which messages the user reads and stores and which messages the user ignores and deletes, and wherein the keywords are keywords in the messages.
23. The method of claim 22, wherein the data targets further include files and the data target information further includes user behavioral data indicating which files the user views, modifies, and deletes, and wherein the keywords in the client profile further include keywords in the files.
24. The method of claim 22, wherein the data targets further include web pages and the data target information further includes user behavioral data indicating which web pages the user visits, and wherein the keywords in the client profile further includes keywords in the web pages.
25. The method of claim 22, wherein the data targets further include hardware and software on the client computer, and wherein the data target information further includes user behavioral data relating to interaction between the user and the hardware or software, and wherein the scoring is further based on the user behavioral data relating to the interaction.
26. The method of claim 21, wherein generating the client profile comprises generating the client profile that further includes key phrases and associated frequencies of occurrence of the key phrases in the data targets.
27. The method of claim 21, wherein the keywords are part of unstructured data in the data targets, and wherein collecting data target information further comprises collecting structured data including at least one from among email addresses and uniform resource locators (URLs), wherein the client profile further includes the at least one from among the email addresses and URLs, and wherein the scoring is further based on the at least one from among the email addresses and URLs.
28. The method of claim 21, wherein the client profile includes a positive profile and a negative profile, wherein the positive profile includes user behavioral data with respect to the data targets the user reads or stores, and the negative profile includes user behavioral data with respect to the data targets the user ignores or deletes, and
wherein the scoring includes providing a higher score for the received data target if the received data target includes content matching content of the positive profile, and providing a lower score for the received data target if the received data target includes content matching content of the negative profile.
29. The method of claim 21, wherein the generating includes:
identifying unstructured data within the data target information; and
performing a statistical analysis on the unstructured data to identify the keywords and calculate the associated frequencies of occurrence of the keywords.
30. The method of claim 29, wherein performing the statistical analysis further identifies key phrases and calculates associated frequencies of occurrence of the key phrases within the unstructured data.
31. The method of claim 21, wherein the storing includes storing the client profile only on the client computer.
32. The method of claim 21, wherein scoring the received data target comprises scoring a received message.
33. The method of claim 32, further comprising:
displaying the received message if a score produced by the scoring exceeds a threshold; and
not displaying the received message if the score is less than the threshold.
34. A system comprising:
a computer including a network module to communicate over a network, and at least one processor to:
access data targets;
collect data target information from the data targets, wherein the data target information includes user behavioral data with respect to the data targets, the user behavioral data indicating which data targets a user reads and stores and which data targets the user ignores and deletes;
generate a client profile from the data target information, the client profile including keywords and associated frequencies of occurrence of the respective keywords in the data targets;
receive a data target; and
score the received data target using the client profile, wherein the scoring is based on the keywords and the associated frequencies.
35. The system of claim 34, wherein the data targets include messages, wherein the data target information includes the user behavioral data indicating which messages the user reads and stores and which messages the user ignores and deletes, and wherein the keywords are keywords in the messages.
36. The system of claim 35, wherein the data targets further include files and the data target information further includes user behavioral data indicating which files the user views, modifies, and deletes, wherein the keywords in the client profile further includes keywords in the files, and wherein the scoring is further based on the keywords in the files and the associated frequencies of the keywords in the files.
37. The system of claim 35, wherein scoring the received data target comprises scoring a received message, the scoring based on determining whether content of the received message is present in the client profile.
38. The system of claim 34, wherein the generated client profile further comprises key phrases and associated frequencies of occurrence of the key phrases in the data targets.
39. The system of claim 34, wherein the keywords are part of unstructured data in the data targets, and wherein collecting the data target information further comprises collecting structured data including at least one from among email addresses and uniform resource locators (URLs), and wherein the client profile further includes the at least one from among the email addresses and URLs, and wherein the scoring is further based on the at least one from among the email addresses and URLs.
40. The system of claim 34, wherein the client profile includes a positive profile and a negative profile, wherein the positive profile includes user behavioral data with respect to the data targets the user reads or stores, and the negative profile includes user behavioral data with respect to the data targets the user ignores or deletes, and
wherein the scoring includes providing a higher score for the received data target if the received data target includes content matching content of the positive profile, and providing a lower score for the received data target if the received data target includes content matching content of the negative profile.
US13/568,391 2002-03-25 2012-08-07 System and method for profiling clients within a system for harvesting community knowledge Expired - Fee Related US9053458B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/568,391 US9053458B2 (en) 2002-03-25 2012-08-07 System and method for profiling clients within a system for harvesting community knowledge

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/106,096 US20030217106A1 (en) 2002-03-25 2002-03-25 System and method for profiling clients within a system for harvesting community knowledge
US13/568,391 US9053458B2 (en) 2002-03-25 2012-08-07 System and method for profiling clients within a system for harvesting community knowledge

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/106,096 Continuation US20030217106A1 (en) 2002-03-25 2002-03-25 System and method for profiling clients within a system for harvesting community knowledge

Publications (2)

Publication Number Publication Date
US20130041906A1 true US20130041906A1 (en) 2013-02-14
US9053458B2 US9053458B2 (en) 2015-06-09

Family

ID=29418310

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/106,096 Abandoned US20030217106A1 (en) 2002-03-25 2002-03-25 System and method for profiling clients within a system for harvesting community knowledge
US13/568,391 Expired - Fee Related US9053458B2 (en) 2002-03-25 2012-08-07 System and method for profiling clients within a system for harvesting community knowledge

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/106,096 Abandoned US20030217106A1 (en) 2002-03-25 2002-03-25 System and method for profiling clients within a system for harvesting community knowledge

Country Status (1)

Country Link
US (2) US20030217106A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10778521B2 (en) * 2016-12-13 2020-09-15 Amazon Technologies, Inc. Reconfiguring a server including a reconfigurable adapter device
US10877961B1 (en) * 2017-09-29 2020-12-29 TAM-C Solutions, LLC Technologies for collecting network-based information
US10909192B2 (en) 2013-10-29 2021-02-02 Micro Focus Llc Providing information technology support
US11809432B2 (en) 2002-01-14 2023-11-07 Awemane Ltd. Knowledge gathering system based on user's affinity

Families Citing this family (123)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7890581B2 (en) 1996-12-16 2011-02-15 Ip Holdings, Inc. Matching network system for mobile devices
US7268700B1 (en) 1998-01-27 2007-09-11 Hoffberg Steven M Mobile communication device
US20030217106A1 (en) * 2002-03-25 2003-11-20 Eytan Adar System and method for profiling clients within a system for harvesting community knowledge
US7389290B2 (en) * 2002-07-31 2008-06-17 Hewlett-Packard Development Company, L.P. System and method for scoring new messages based on previous responses within a system for harvesting community knowledge
US9818136B1 (en) 2003-02-05 2017-11-14 Steven M. Hoffberg System and method for determining contingent relevance
US8261062B2 (en) 2003-03-27 2012-09-04 Microsoft Corporation Non-cryptographic addressing
US8055753B2 (en) * 2003-06-11 2011-11-08 International Business Machines Corporation Peer to peer job monitoring and control in grid computing systems
US9449091B1 (en) 2003-08-20 2016-09-20 Ip Holdings, Inc. Professional and employee social networks and social media systems
US8554794B2 (en) 2004-05-17 2013-10-08 Hoover's Inc. System and method for enforcing privacy in social networks
WO2005116851A2 (en) * 2004-05-25 2005-12-08 Postini, Inc. Electronic message source information reputation system
US7929689B2 (en) 2004-06-30 2011-04-19 Microsoft Corporation Call signs
WO2006015237A2 (en) 2004-07-28 2006-02-09 Visible Path Corporation Systems and methods for using social networks for the distribution of communications
US7590589B2 (en) 2004-09-10 2009-09-15 Hoffberg Steven M Game theoretic prioritization scheme for mobile ad hoc networks permitting hierarchal deference
US8874477B2 (en) 2005-10-04 2014-10-28 Steven Mark Hoffberg Multifactorial optimization system and method
US8898141B1 (en) 2005-12-09 2014-11-25 Hewlett-Packard Development Company, L.P. System and method for information management
US8069208B2 (en) * 2006-04-21 2011-11-29 Microsoft Corporation Peer-to-peer buddy request and response
US8086842B2 (en) 2006-04-21 2011-12-27 Microsoft Corporation Peer-to-peer contact exchange
EP1873700A1 (en) * 2006-06-28 2008-01-02 Océ-Technologies B.V. Method, system and software product for locating competence in a group of users connected to an electronic communications network
US9298783B2 (en) 2007-07-25 2016-03-29 Yahoo! Inc. Display of attachment based information within a messaging system
US8140502B2 (en) * 2008-06-27 2012-03-20 Microsoft Corporation Preserving individual information privacy by providing anonymized customer data
US8805996B1 (en) * 2009-02-23 2014-08-12 Symantec Corporation Analysis of communications in social networks
US9633117B2 (en) 2009-04-27 2017-04-25 Hewlett Packard Enterprise Development Lp System and method for making a recommendation based on user data
US20110072128A1 (en) * 2009-09-20 2011-03-24 International Business Machines Corporation Automated presence ranking for communications networks
US9760866B2 (en) * 2009-12-15 2017-09-12 Yahoo Holdings, Inc. Systems and methods to provide server side profile information
US8423545B2 (en) 2010-02-03 2013-04-16 Xobni Corporation Providing user input suggestions for conflicting data using rank determinations
US8924956B2 (en) 2010-02-03 2014-12-30 Yahoo! Inc. Systems and methods to identify users using an automated learning process
US8706822B2 (en) * 2010-06-23 2014-04-22 Microsoft Corporation Delivering messages from message sources to subscribing recipients
US9747583B2 (en) 2011-06-30 2017-08-29 Yahoo Holdings, Inc. Presenting entity profile information to a user of a computing device
US20130035944A1 (en) * 2011-08-02 2013-02-07 General Instrument Corporation Personalizing communications based on an estimated sensitivity level of the recipient
US20130036173A1 (en) * 2011-08-02 2013-02-07 General Instrument Corporation Personalizing communications using estimates of the recipient's sensitivity level derived from responses to communications
US10155168B2 (en) 2012-05-08 2018-12-18 Snap Inc. System and method for adaptable avatars
US10192200B2 (en) 2012-12-04 2019-01-29 Oath Inc. Classifying a portion of user contact data into local contacts
US9705831B2 (en) 2013-05-30 2017-07-11 Snap Inc. Apparatus and method for maintaining a message thread with opt-in permanence for entries
US10439972B1 (en) 2013-05-30 2019-10-08 Snap Inc. Apparatus and method for maintaining a message thread with opt-in permanence for entries
US9276886B1 (en) 2014-05-09 2016-03-01 Snapchat, Inc. Apparatus and method for dynamically configuring application component tiles
US9537811B2 (en) 2014-10-02 2017-01-03 Snap Inc. Ephemeral gallery of ephemeral messages
US9396354B1 (en) 2014-05-28 2016-07-19 Snapchat, Inc. Apparatus and method for automated privacy protection in distributed images
US9113301B1 (en) 2014-06-13 2015-08-18 Snapchat, Inc. Geo-location based event gallery
US10824654B2 (en) 2014-09-18 2020-11-03 Snap Inc. Geolocation-based pictographs
US10284508B1 (en) 2014-10-02 2019-05-07 Snap Inc. Ephemeral gallery of ephemeral messages with opt-in permanence
US9385983B1 (en) 2014-12-19 2016-07-05 Snapchat, Inc. Gallery of messages from individuals with a shared interest
US10311916B2 (en) 2014-12-19 2019-06-04 Snap Inc. Gallery of videos set to an audio time line
US9754355B2 (en) 2015-01-09 2017-09-05 Snap Inc. Object recognition based photo filters
US10133705B1 (en) 2015-01-19 2018-11-20 Snap Inc. Multichannel system
US9294425B1 (en) 2015-02-06 2016-03-22 Snapchat, Inc. Storage and processing of ephemeral messages
EP3272078B1 (en) 2015-03-18 2022-01-19 Snap Inc. Geo-fence authorization provisioning
US10135949B1 (en) 2015-05-05 2018-11-20 Snap Inc. Systems and methods for story and sub-story navigation
CN107431632B (en) 2015-05-06 2022-09-16 斯纳普公司 System and method for transient group chat
US9906479B1 (en) 2015-06-16 2018-02-27 Snap Inc. Storage management for ephemeral messages
US10503264B1 (en) 2015-06-16 2019-12-10 Snap Inc. Radial gesture navigation
US11121997B1 (en) 2015-08-24 2021-09-14 Snap Inc. Systems, devices, and methods for determining a non-ephemeral message status in a communication system
US10616162B1 (en) 2015-08-24 2020-04-07 Snap Inc. Systems devices and methods for automatically selecting an ephemeral message availability
US10157333B1 (en) 2015-09-15 2018-12-18 Snap Inc. Systems and methods for content tagging
US9652896B1 (en) 2015-10-30 2017-05-16 Snap Inc. Image based tracking in augmented reality systems
US11119628B1 (en) 2015-11-25 2021-09-14 Snap Inc. Dynamic graphical user interface modification and monitoring
US9984499B1 (en) 2015-11-30 2018-05-29 Snap Inc. Image and point cloud based tracking and in augmented reality systems
US10354425B2 (en) 2015-12-18 2019-07-16 Snap Inc. Method and system for providing context relevant media augmentation
US10530731B1 (en) 2016-03-28 2020-01-07 Snap Inc. Systems and methods for chat with audio and video elements
US10270839B2 (en) 2016-03-29 2019-04-23 Snap Inc. Content collection navigation and autoforwarding
US10339365B2 (en) 2016-03-31 2019-07-02 Snap Inc. Automated avatar generation
US10686899B2 (en) 2016-04-06 2020-06-16 Snap Inc. Messaging achievement pictograph display system
US9813642B1 (en) 2016-05-06 2017-11-07 Snap Inc. Dynamic activity-based image generation
US10474353B2 (en) 2016-05-31 2019-11-12 Snap Inc. Application control using a gesture based trigger
US11507977B2 (en) 2016-06-28 2022-11-22 Snap Inc. Methods and systems for presentation of media collections with automated advertising
US9681265B1 (en) 2016-06-28 2017-06-13 Snap Inc. System to track engagement of media items
US10182047B1 (en) 2016-06-30 2019-01-15 Snap Inc. Pictograph password security system
US11334768B1 (en) 2016-07-05 2022-05-17 Snap Inc. Ephemeral content management
US10552968B1 (en) 2016-09-23 2020-02-04 Snap Inc. Dense feature scale detection for image matching
US10609036B1 (en) 2016-10-10 2020-03-31 Snap Inc. Social media post subscribe requests for buffer user accounts
US10432559B2 (en) 2016-10-24 2019-10-01 Snap Inc. Generating and displaying customized avatars in electronic messages
US10469764B2 (en) 2016-11-01 2019-11-05 Snap Inc. Systems and methods for determining settings for fast video capture and sensor adjustment
US10740939B1 (en) 2016-12-09 2020-08-11 Snap Inc. Fast image style transfers
US10319149B1 (en) 2017-02-17 2019-06-11 Snap Inc. Augmented reality anamorphosis system
US11019001B1 (en) 2017-02-20 2021-05-25 Snap Inc. Selective presentation of group messages
US10374993B2 (en) 2017-02-20 2019-08-06 Snap Inc. Media item attachment system
US10074381B1 (en) 2017-02-20 2018-09-11 Snap Inc. Augmented reality speech balloon system
US10878837B1 (en) 2017-03-01 2020-12-29 Snap Inc. Acoustic neural network scene detection
US10581782B2 (en) 2017-03-27 2020-03-03 Snap Inc. Generating a stitched data stream
US10582277B2 (en) 2017-03-27 2020-03-03 Snap Inc. Generating a stitched data stream
US11170393B1 (en) 2017-04-11 2021-11-09 Snap Inc. System to calculate an engagement score of location based media content
US10387730B1 (en) 2017-04-20 2019-08-20 Snap Inc. Augmented reality typography personalization system
WO2018201102A1 (en) 2017-04-27 2018-11-01 Snap Inc. Friend location sharing mechanism for social media platforms
US10382372B1 (en) 2017-04-27 2019-08-13 Snap Inc. Processing media content based on original context
US11893647B2 (en) 2017-04-27 2024-02-06 Snap Inc. Location-based virtual avatars
US10212541B1 (en) 2017-04-27 2019-02-19 Snap Inc. Selective location-based identity communication
US10943255B1 (en) 2017-04-28 2021-03-09 Snap Inc. Methods and systems for interactive advertising with media collections
US10679428B1 (en) 2017-05-26 2020-06-09 Snap Inc. Neural network-based image stream modification
US10788900B1 (en) 2017-06-29 2020-09-29 Snap Inc. Pictorial symbol prediction
US11323398B1 (en) 2017-07-31 2022-05-03 Snap Inc. Systems, devices, and methods for progressive attachments
US11216517B1 (en) 2017-07-31 2022-01-04 Snap Inc. Methods and systems for selecting user generated content
US11164376B1 (en) 2017-08-30 2021-11-02 Snap Inc. Object modeling using light projection
US9980100B1 (en) 2017-08-31 2018-05-22 Snap Inc. Device location based on machine learning classifications
US10474900B2 (en) 2017-09-15 2019-11-12 Snap Inc. Real-time tracking-compensated image effects
US10740974B1 (en) 2017-09-15 2020-08-11 Snap Inc. Augmented reality system
US10891723B1 (en) 2017-09-29 2021-01-12 Snap Inc. Realistic neural network based image style transfer
US10872292B1 (en) 2017-10-09 2020-12-22 Snap Inc. Compact neural networks using condensed filters
US10599289B1 (en) 2017-11-13 2020-03-24 Snap Inc. Interface to display animated icon
US11551059B1 (en) 2017-11-15 2023-01-10 Snap Inc. Modulated image segmentation
US10885564B1 (en) 2017-11-28 2021-01-05 Snap Inc. Methods, system, and non-transitory computer readable storage medium for dynamically configurable social media platform
US10217488B1 (en) 2017-12-15 2019-02-26 Snap Inc. Spherical video editing
US11017173B1 (en) 2017-12-22 2021-05-25 Snap Inc. Named entity recognition visual context and caption data
US10523606B2 (en) 2018-01-02 2019-12-31 Snap Inc. Generating interactive messages with asynchronous media content
US10482565B1 (en) 2018-02-12 2019-11-19 Snap Inc. Multistage neural network processing using a graphics processor
US10726603B1 (en) 2018-02-28 2020-07-28 Snap Inc. Animated expressive icon
US10885136B1 (en) 2018-02-28 2021-01-05 Snap Inc. Audience filtering system
US10327096B1 (en) 2018-03-06 2019-06-18 Snap Inc. Geo-fence selection system
US11310176B2 (en) 2018-04-13 2022-04-19 Snap Inc. Content suggestion system
KR20200143464A (en) 2018-04-18 2020-12-23 스냅 인코포레이티드 Augmented expression system
US11487501B2 (en) 2018-05-16 2022-11-01 Snap Inc. Device control using audio data
US10997760B2 (en) 2018-08-31 2021-05-04 Snap Inc. Augmented reality anthropomorphization system
US11297027B1 (en) 2019-01-31 2022-04-05 Snap Inc. Automated image processing and insight presentation
US11134036B2 (en) 2019-07-05 2021-09-28 Snap Inc. Event planning in a content sharing platform
US11812347B2 (en) 2019-09-06 2023-11-07 Snap Inc. Non-textual communication and user states management
US11265281B1 (en) 2020-01-28 2022-03-01 Snap Inc. Message deletion policy selection
US11316806B1 (en) 2020-01-28 2022-04-26 Snap Inc. Bulk message deletion
US11625873B2 (en) 2020-03-30 2023-04-11 Snap Inc. Personalized media overlay recommendation
WO2021203120A1 (en) * 2020-03-31 2021-10-07 Snap Inc. Augmented reality beauty product tutorials
US11700225B2 (en) 2020-04-23 2023-07-11 Snap Inc. Event overlay invite messaging system
US11843574B2 (en) 2020-05-21 2023-12-12 Snap Inc. Featured content collection interface
US11857879B2 (en) 2020-06-10 2024-01-02 Snap Inc. Visual search to launch application
US11423652B2 (en) 2020-06-10 2022-08-23 Snap Inc. Adding beauty products to augmented reality tutorials
US11899905B2 (en) 2020-06-30 2024-02-13 Snap Inc. Selectable items providing post-viewing context actions
KR20230047480A (en) 2020-08-13 2023-04-07 스냅 인코포레이티드 User interface for pose-driven virtual effects

Citations (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5710884A (en) * 1995-03-29 1998-01-20 Intel Corporation System for automatically updating personal profile server with updates to additional user information gathered from monitoring user's electronic consuming habits generated on computer during use
US5870559A (en) * 1996-10-15 1999-02-09 Mercury Interactive Software system and associated methods for facilitating the analysis and management of web sites
US5916302A (en) * 1996-12-06 1999-06-29 International Business Machines Corporation Multimedia conferencing using parallel networks
US6029195A (en) * 1994-11-29 2000-02-22 Herz; Frederick S. M. System for customized electronic identification of desirable objects
US20010013009A1 (en) * 1997-05-20 2001-08-09 Daniel R. Greening System and method for computer-based marketing
US6286043B1 (en) * 1998-08-26 2001-09-04 International Business Machines Corp. User profile management in the presence of dynamic pages using content templates
US20010037407A1 (en) * 2000-03-23 2001-11-01 Zvetan Dragulev System and method for managing user-specific data
US6363415B1 (en) * 1995-05-08 2002-03-26 Cranberry Properties Llc System and method for distributing electronic messages in accordance with rules
US20020042923A1 (en) * 1992-12-09 2002-04-11 Asmussen Michael L. Video and digital multimedia aggregator content suggestion engine
US20020073058A1 (en) * 2000-12-07 2002-06-13 Oren Kremer Method and apparatus for providing web site preview information
US20020083179A1 (en) * 2000-05-12 2002-06-27 Shaw Venson M . System and method of personalizing communication sessions based on user behavior
US20020152284A1 (en) * 2001-04-13 2002-10-17 John Cambray System and method for performing real time monitoring and control of an interactive network
US20020174185A1 (en) * 2001-05-01 2002-11-21 Jai Rawat Method and system of automating data capture from electronic correspondence
US20020198973A1 (en) * 2001-04-30 2002-12-26 Besaw Lawrence M. System for dynamic customer filtering of management information presented through a web-based portal
US20030023715A1 (en) * 2001-07-16 2003-01-30 David Reiner System and method for logical view analysis and visualization of user behavior in a distributed computer network
US20030115333A1 (en) * 2001-07-06 2003-06-19 Tal Cohen System and method for analyzing system visitor activities
US20030123465A1 (en) * 2001-12-28 2003-07-03 Hughes Electronics Corporation System and method for content filtering using static source routes
US6609106B1 (en) * 1999-05-07 2003-08-19 Steven C. Robertson System and method for providing electronic multi-merchant gift registry services over a distributed network
US20030167402A1 (en) * 2001-08-16 2003-09-04 Stolfo Salvatore J. System and methods for detecting malicious email transmission
US20030177118A1 (en) * 2002-03-06 2003-09-18 Charles Moon System and method for classification of documents
US6633316B1 (en) * 1999-05-13 2003-10-14 International Business Machines Corporation Method and apparatus for implementing direct link selection of cached, previously visited links in nested web pages
US20030217106A1 (en) * 2002-03-25 2003-11-20 Eytan Adar System and method for profiling clients within a system for harvesting community knowledge
US6681247B1 (en) * 1999-10-18 2004-01-20 Hrl Laboratories, Llc Collaborator discovery method and system
US20040034706A1 (en) * 1999-11-30 2004-02-19 International Business Machines Corporation Visualizing access to a computer resource
US20040039786A1 (en) * 2000-03-16 2004-02-26 Horvitz Eric J. Use of a bulk-email filter within a system for classifying messages for urgency or importance
US6701362B1 (en) * 2000-02-23 2004-03-02 Purpleyogi.Com Inc. Method for creating user profiles
US20040122730A1 (en) * 2001-01-02 2004-06-24 Tucciarone Joel D. Electronic messaging system and method thereof
US6895437B1 (en) * 2000-09-07 2005-05-17 Usability Sciences Corporation System for monitoring browsing activity of a visitor and decrementing a reference count upon a web page change for automatic unloading a client program
US6925442B1 (en) * 1999-01-29 2005-08-02 Elijahu Shapira Method and apparatus for evaluating vistors to a web server
US20060123105A1 (en) * 1999-05-03 2006-06-08 Parekh Sanjay M Systems and methods for determining, collecting, and using geographic locations of internet users
US7152106B2 (en) * 2001-07-06 2006-12-19 Clickfox, Llc Use of various methods to reconstruct experiences of web site visitors
US20080077669A1 (en) * 2006-09-22 2008-03-27 Cuneyt Ozveren Peer-To-Peer Learning For Peer-To-Peer Collaboration
US20080244053A1 (en) * 2007-03-30 2008-10-02 Yahoo! Inc. Geographic reader display data
US20090077163A1 (en) * 2007-09-14 2009-03-19 Phorm Uk, Inc. Approach for identifying and providing targeted content to a network client with reduced impact to the service provider
US20090287683A1 (en) * 2008-05-14 2009-11-19 Bennett James D Network server employing client favorites information and profiling
US20120221544A1 (en) * 2009-11-06 2012-08-30 Huawei Technologies Co., Ltd. Method, apparatus, and system for mobile search
US20120271805A1 (en) * 2011-04-19 2012-10-25 Microsoft Corporation Predictively suggesting websites
US20130254217A1 (en) * 2012-03-07 2013-09-26 Ut-Battelle, Llc Recommending personally interested contents by text mining, filtering, and interfaces

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2963463B2 (en) 1989-05-18 1999-10-18 株式会社リコー Interactive language analyzer
US5446891A (en) 1992-02-26 1995-08-29 International Business Machines Corporation System for adjusting hypertext links with weighed user goals and activities
US5689708A (en) * 1995-03-31 1997-11-18 Showcase Corporation Client/server computer systems having control of client-based application programs, and application-program control means therefor
US6119114A (en) 1996-09-17 2000-09-12 Smadja; Frank Method and apparatus for dynamic relevance ranking
US6230269B1 (en) 1998-03-04 2001-05-08 Microsoft Corporation Distributed authentication system and method
US6154783A (en) 1998-09-18 2000-11-28 Tacit Knowledge Systems Method and apparatus for addressing an electronic document for transmission over a network
US6115709A (en) 1998-09-18 2000-09-05 Tacit Knowledge Systems, Inc. Method and system for constructing a knowledge profile of a user having unrestricted and restricted access portions according to respective levels of confidence of content of the portions
US6578025B1 (en) * 1999-06-11 2003-06-10 Abuzz Technologies, Inc. Method and apparatus for distributing information to users
US7171415B2 (en) 2001-05-04 2007-01-30 Sun Microsystems, Inc. Distributed information discovery through searching selected registered information providers
US7124353B2 (en) 2002-01-14 2006-10-17 International Business Machines Corporation System and method for calculating a user affinity
US20030172067A1 (en) 2002-03-07 2003-09-11 Eytan Adar System and method for harvesting community knowledge
US20040001476A1 (en) * 2002-06-24 2004-01-01 Nayeem Islam Mobile application environment
US20040002896A1 (en) * 2002-06-28 2004-01-01 Jenni Alanen Collection of behavior data on a broadcast data network
US7120654B2 (en) 2002-08-20 2006-10-10 Veritas Operating Corporation System and method for network-free file replication in a storage area network
US7853684B2 (en) * 2002-10-15 2010-12-14 Sas Institute Inc. System and method for processing web activity data

Patent Citations (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020042923A1 (en) * 1992-12-09 2002-04-11 Asmussen Michael L. Video and digital multimedia aggregator content suggestion engine
US6029195A (en) * 1994-11-29 2000-02-22 Herz; Frederick S. M. System for customized electronic identification of desirable objects
US5710884A (en) * 1995-03-29 1998-01-20 Intel Corporation System for automatically updating personal profile server with updates to additional user information gathered from monitoring user's electronic consuming habits generated on computer during use
US6363415B1 (en) * 1995-05-08 2002-03-26 Cranberry Properties Llc System and method for distributing electronic messages in accordance with rules
US5870559A (en) * 1996-10-15 1999-02-09 Mercury Interactive Software system and associated methods for facilitating the analysis and management of web sites
US5916302A (en) * 1996-12-06 1999-06-29 International Business Machines Corporation Multimedia conferencing using parallel networks
US20010013009A1 (en) * 1997-05-20 2001-08-09 Daniel R. Greening System and method for computer-based marketing
US6286043B1 (en) * 1998-08-26 2001-09-04 International Business Machines Corp. User profile management in the presence of dynamic pages using content templates
US6925442B1 (en) * 1999-01-29 2005-08-02 Elijahu Shapira Method and apparatus for evaluating vistors to a web server
US20060123105A1 (en) * 1999-05-03 2006-06-08 Parekh Sanjay M Systems and methods for determining, collecting, and using geographic locations of internet users
US6609106B1 (en) * 1999-05-07 2003-08-19 Steven C. Robertson System and method for providing electronic multi-merchant gift registry services over a distributed network
US6633316B1 (en) * 1999-05-13 2003-10-14 International Business Machines Corporation Method and apparatus for implementing direct link selection of cached, previously visited links in nested web pages
US6681247B1 (en) * 1999-10-18 2004-01-20 Hrl Laboratories, Llc Collaborator discovery method and system
US20040034706A1 (en) * 1999-11-30 2004-02-19 International Business Machines Corporation Visualizing access to a computer resource
US6701362B1 (en) * 2000-02-23 2004-03-02 Purpleyogi.Com Inc. Method for creating user profiles
US20040039786A1 (en) * 2000-03-16 2004-02-26 Horvitz Eric J. Use of a bulk-email filter within a system for classifying messages for urgency or importance
US20010037407A1 (en) * 2000-03-23 2001-11-01 Zvetan Dragulev System and method for managing user-specific data
US20020083179A1 (en) * 2000-05-12 2002-06-27 Shaw Venson M . System and method of personalizing communication sessions based on user behavior
US6895437B1 (en) * 2000-09-07 2005-05-17 Usability Sciences Corporation System for monitoring browsing activity of a visitor and decrementing a reference count upon a web page change for automatic unloading a client program
US20020073058A1 (en) * 2000-12-07 2002-06-13 Oren Kremer Method and apparatus for providing web site preview information
US20040122730A1 (en) * 2001-01-02 2004-06-24 Tucciarone Joel D. Electronic messaging system and method thereof
US20020152284A1 (en) * 2001-04-13 2002-10-17 John Cambray System and method for performing real time monitoring and control of an interactive network
US20020198973A1 (en) * 2001-04-30 2002-12-26 Besaw Lawrence M. System for dynamic customer filtering of management information presented through a web-based portal
US20020174185A1 (en) * 2001-05-01 2002-11-21 Jai Rawat Method and system of automating data capture from electronic correspondence
US20030115333A1 (en) * 2001-07-06 2003-06-19 Tal Cohen System and method for analyzing system visitor activities
US7152106B2 (en) * 2001-07-06 2006-12-19 Clickfox, Llc Use of various methods to reconstruct experiences of web site visitors
US20030023715A1 (en) * 2001-07-16 2003-01-30 David Reiner System and method for logical view analysis and visualization of user behavior in a distributed computer network
US20030167402A1 (en) * 2001-08-16 2003-09-04 Stolfo Salvatore J. System and methods for detecting malicious email transmission
US20030123465A1 (en) * 2001-12-28 2003-07-03 Hughes Electronics Corporation System and method for content filtering using static source routes
US20030177118A1 (en) * 2002-03-06 2003-09-18 Charles Moon System and method for classification of documents
US20030217106A1 (en) * 2002-03-25 2003-11-20 Eytan Adar System and method for profiling clients within a system for harvesting community knowledge
US20080077669A1 (en) * 2006-09-22 2008-03-27 Cuneyt Ozveren Peer-To-Peer Learning For Peer-To-Peer Collaboration
US20080244053A1 (en) * 2007-03-30 2008-10-02 Yahoo! Inc. Geographic reader display data
US20090077163A1 (en) * 2007-09-14 2009-03-19 Phorm Uk, Inc. Approach for identifying and providing targeted content to a network client with reduced impact to the service provider
US20090287683A1 (en) * 2008-05-14 2009-11-19 Bennett James D Network server employing client favorites information and profiling
US20120221544A1 (en) * 2009-11-06 2012-08-30 Huawei Technologies Co., Ltd. Method, apparatus, and system for mobile search
US20120271805A1 (en) * 2011-04-19 2012-10-25 Microsoft Corporation Predictively suggesting websites
US20130254217A1 (en) * 2012-03-07 2013-09-26 Ut-Battelle, Llc Recommending personally interested contents by text mining, filtering, and interfaces

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11809432B2 (en) 2002-01-14 2023-11-07 Awemane Ltd. Knowledge gathering system based on user's affinity
US10909192B2 (en) 2013-10-29 2021-02-02 Micro Focus Llc Providing information technology support
US10778521B2 (en) * 2016-12-13 2020-09-15 Amazon Technologies, Inc. Reconfiguring a server including a reconfigurable adapter device
US10877961B1 (en) * 2017-09-29 2020-12-29 TAM-C Solutions, LLC Technologies for collecting network-based information

Also Published As

Publication number Publication date
US20030217106A1 (en) 2003-11-20
US9053458B2 (en) 2015-06-09

Similar Documents

Publication Publication Date Title
US9053458B2 (en) System and method for profiling clients within a system for harvesting community knowledge
US6915284B2 (en) System and method for automated message response, within a system for harvesting community knowledge
US20040024719A1 (en) System and method for scoring messages within a system for harvesting community kowledge
US20030172067A1 (en) System and method for harvesting community knowledge
US6332141B2 (en) Apparatus and method of implementing fast internet real-time search technology (FIRST)
US7246121B2 (en) System and method for modifying new message retransmission within a system for harvesting community knowledge
US6546387B1 (en) Computer network information management system and method using intelligent software agents
US6978292B1 (en) Communication support method and system
Schwartz Internet resource discovery at the University of Colorado
US8346753B2 (en) System and method for searching for internet-accessible content
US6633867B1 (en) System and method for providing a session query within the context of a dynamic search result set
US7822812B2 (en) Techniques for sharing content information with members of a virtual user group in a network environment without compromising user privacy
US20080134042A1 (en) Qkd System Wth Ambiguous Control
US20050182745A1 (en) Method and apparatus for sharing information over a network
US20060059225A1 (en) Methods and apparatus for automatic generation of recommended links
US20020107925A1 (en) Method and system for e-mail management
US20120016875A1 (en) Personalized data search utilizing social activities
US20100114965A1 (en) System and method for impromptu shared communication spaces
WO2002010982A2 (en) Computer system for collecting information from web sites
JP3896014B2 (en) Information collection system, information collection method, and program causing computer to collect information
GB2352542A (en) Information retrieval augmented by the use of communication relationship data
KR20010031249A (en) Information management system
US7389290B2 (en) System and method for scoring new messages based on previous responses within a system for harvesting community knowledge
US20030182401A1 (en) URL information sharing system using proxy cache of proxy log
US7467126B2 (en) Removal of stale information

Legal Events

Date Code Title Description
STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.;REEL/FRAME:037079/0001

Effective date: 20151027

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4

AS Assignment

Owner name: OT PATENT ESCROW, LLC, ILLINOIS

Free format text: PATENT ASSIGNMENT, SECURITY INTEREST, AND LIEN AGREEMENT;ASSIGNORS:HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP;HEWLETT PACKARD ENTERPRISE COMPANY;REEL/FRAME:055269/0001

Effective date: 20210115

AS Assignment

Owner name: VALTRUS INNOVATIONS LIMITED, IRELAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:OT PATENT ESCROW, LLC;REEL/FRAME:060005/0600

Effective date: 20220504

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20230609